从这个网页截图中,可以获取到以下关于漏洞的关键信息: 1. 漏洞名称:Decidim-Awesome: SQL injection in AdminAccountability 2. 漏洞类型:CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') 3. 受影响的版本: - >= 0.9.1, = 0.11.0, = 0.11.2 4. 已确认的供应商:Yes 5. 攻击类型:Remote 6. 影响: - Code Execution - Escalation of Privileges - Information Disclosure 7. 受影响的组件: - A raw sql-statement that uses an interpolated variable exists in the admin_role_actions method of the papertrail/version-model(app/models/decidim/decidim_awesome/paper_trail_version.rb). 8. 攻击向量: - An attacker with admin permissions could manipulate database queries in order to read out the database, read files from the filesystem, write files from the filesystem. In the worst case, this could lead to remote code execution on the server. 9. 发现者:Wolfgang Hotwagner 10. 参考链接: - https://pentest.ait.ac.at/security-advisory/decidim-awesome-sql-injection-in-adminaccountability/ - https://portswigger.net/web-security/sql-injection 这些信息可以帮助理解漏洞的性质、影响范围以及如何利用漏洞进行攻击。